Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-05-2024 16:20
Static task
static1
Behavioral task
behavioral1
Sample
7d9a36d1c6469676ab175faf6cff041f_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7d9a36d1c6469676ab175faf6cff041f_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
7d9a36d1c6469676ab175faf6cff041f_JaffaCakes118.html
-
Size
4KB
-
MD5
7d9a36d1c6469676ab175faf6cff041f
-
SHA1
7a651168f8656ed8ad37929992c412fb5ad4892d
-
SHA256
650fb063b6d596e6a34aaf31499f4b6d741b2ed6dd59dafce75714a47f3fc937
-
SHA512
4fb9742b4a58719c1cc05712509fe6b338fd8769d8b3343200428f174deaec55809e0a8988bb41baa355aead9120c08264a1f56c4e82204dc629758a5bc20c99
-
SSDEEP
96:4UYt2P2nJxe37ED5fEKcbNcrOaWxmkc+4sXn6Exd3tKf0Wga/jrR:benveLEDVTcWrOmPg62dtcpN
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000003d899c26ba12b4aa78f7ae25883d11b00000000020000000000106600000001000020000000fa1dbb3885815782fe9bc0b455d1e89e8de98c5e8514c7af5505e7506ec5be4c000000000e80000000020000200000001185c6714334604955c316122199e5b94ffee9db78e24f67e8627d8af0bb6f7b20000000744622ee45c93433196fa1ebdff73f85f9adb0e7c2f47ea9bf2d8ebe924e469640000000a738054663e9ad9efc5d7b8af1ffdb367bb80da7ee8c75d68d8b492e3bfb4e6e713581c86958e8c53316f70d01b93971d2614c42ee2e1464c1a24dbcec74242e iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b01a6d101bb1da01 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "423075111" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{3BD817E1-1D0E-11EF-B238-4AE872E97954} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1896 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1896 iexplore.exe 1896 iexplore.exe 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE 2872 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1896 wrote to memory of 2872 1896 iexplore.exe 28 PID 1896 wrote to memory of 2872 1896 iexplore.exe 28 PID 1896 wrote to memory of 2872 1896 iexplore.exe 28 PID 1896 wrote to memory of 2872 1896 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\7d9a36d1c6469676ab175faf6cff041f_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1896 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5967b555b18e15ca08a4e0d086780dfe7
SHA10a0a9d532ab4fcd47c231f6bb07f5d2f77851841
SHA2565bc6a770bb04568f3fb7dbfd2024d03c5bceafe141385378f2d7281b34744aad
SHA5128d540916043832c19be0139c11d4ba1eab02b68b9f2d0c1d145e221e5f40b1a8e4d496f87a4021d38f114fba17a110e1a1d884f9b39211273c51d95cf528012e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5777538fd2874063baf965d59516d640e
SHA1491ad9dfbd020368be022dce93adccb64183876e
SHA256a107728c408ffba91b73701115f27fa735225f38c0f43319ca0fa9ccb5916ea9
SHA51211ded7d1cfa8a9eeb89ae3fb97daf283d56761d6f266b4c059ac4224c3e3da75f579e0896847309a3b7127de297c2ebe697327ff764fd4bfd7764542b84e028a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bef7a193eee0195ea8a03c014795fe47
SHA17f300557e78742188b182e6fe465bab58d38729a
SHA256530c85c15804291826d435d89dc67b5d11c981efb486dc0462dbce214fd149ad
SHA5120731cb70dcc93951d81e7eb6e53eae74e0bf5097ed03530dfbb072068289972098eac1e64585ddaf175bd75055f920219317daf869aa0d7841276b830eed40f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51bc73eda6e5e88d49dc38191375c92bb
SHA1a7173dbb8aa3fe537e162acfc1cea5837dcf0521
SHA256e032006fe51f3f885cf92883f71dd023b564dff0228041d8b7ce2b780bb7ecb9
SHA5125ce4b8e564b4edfdc40a942da8a6a991ed7259c9c0018fa2f26fcdff25c670431d94750136a5767c847cd4e48092f0f9dc1edfb71018377a470ced74619ed028
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5684b4f42e965a52332cd8fee32885472
SHA1e953ac2be9dec8c59989b88cc777216b2c4c3757
SHA25645033e37b8b54becd083db764cabbb4511587d2af223594e90901116d03e3b37
SHA5127d4c9ad06319dc239d709194d839c0124739160f5fe27e881e71762ef69e9f05f1fd3702b55e5b778f8ed861d18e98351fec12736cbf4886ab9ee2fd3368fc21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD564032cf5b1293c5bb58e49978b6e44c0
SHA1a2e6949470f3b2f04d3131c0d5b151e606376bea
SHA2565aa13d8e287cecbdec791323ae2c7bead8c70564d4406683008c866680c103fe
SHA512520c7a1f73ec2d58526f1a59e0f00fd5af0be3bed63d07c743d232226e7e6d926cada793ceb53d9e767f6b5b52c679f54ab33335dea5c2da6cb0d24e74393387
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5cff59faac968bfac84d23b15fddd7f1f
SHA1120fd63bd390e4b0af22ac056bd4738b224a281e
SHA2560894c9499faf0a5a8870a5a426fffca7bb91ea1b4bf845146cc479285a776d7d
SHA5124e2c76f947b951d4d4a34f043ea57051a03f31946b5b37513be193d61d2a21a58676f65cfa5b339c6c80bab348773394316b55629bfe36b4f43504fb6a755d27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5af5a3fb25f0fa5394b5f2fa1ff1c3415
SHA1b94fef9072ff8937405309a6a234ce149ae50792
SHA256e9c3940756bc40a930aae5316f100af858679e75374b499928f3fd8384bcc80b
SHA51292b48dc8496220d9ab92a6773c893238af3c5e14453c53a3d1dabe75f7f5a010c0dd1ff143b92797b2c4df7031b163c2f73ea1b5e076e0e98f05e4fa8d4d527d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5bef1db12dd1cbd0c50719ea92fc87d9c
SHA15fe6d56625059a282deb3236d2117cda63d3b2e1
SHA256d568fbf4a85be66e10ecd51f7c2e53ec54b4e1047509393aed978add4f25b4e9
SHA5122e1d57e36bafaa9b93a8e14d5225c765e511bfa6d93e7dd858320a24cf36d5cf217f6f8112fcf15eeb4332a6078856d60750bf7aaeaeda5f6becc86ca49ccbb3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e13c20731be782b2a1b3a1d765587a08
SHA169d4d5791ea0a702b73bd29e195db5df54fc1aa2
SHA256138c1a0d51cf7b3aa252e3f9456a4614dfbcbab320f158fb450b017a87d56f83
SHA5126afa07cd3656c0123789ee6836f6459746fd11855dacfd93e733d601cf8f055f61185a293ab51a0c35d49965a36a67962cf3bc25c8cf8cb69b889cc8e0fe1aca
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54ae5bf6cb29c436ee2308cc760599e7d
SHA18eeb6fb0ab1435623fb2445c4ef2f22d86dce500
SHA256ac8030fd4c5db0ed572c782e43f779f8b34a252bb381ac0a4573a0ebb3ebe543
SHA5122c44b34f8fedd814705c29a0bb44591a707c94b32e9fdd9dd3339033077dc7490a05ddf24aaf416aa1c05f6cca82b73cfcb40610613005a56d45c470e83ec3e3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5db2665fb867690d26f9aafb8daedc8c0
SHA1bc78efa7721c1e6be4446f3d2bd47c32686b3f5b
SHA256ec6f9c58876f5d9a0cfe1769956bfef97da0603d3fd8c68fdb528b68dd24d3cf
SHA5124a6af0cade26115d1b541ea797961a3e6aa5f585d2f8d96fe3a030d141a908dc118e01101ee0b31195c1ab6dd821f86629c87beeed92205f5e04608e2bdb1478
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5df6ab62472cab71ed5665a84a4c0da4c
SHA1e02b0121136b472869f91725a04e9b51a092cd49
SHA2567b07630e03683464b7469dc337b781a425a92a90341e7a0caa01c1587190aa06
SHA5124f77c28d464a2e19595d7d2776a61fe8f1fc047d2064eb624d840da8ab461345889e053db2d2333d6fc83ab9777c0b8d3a61af5142f3d5b28f7eefd78ba13732
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5749ad2e8b968a2374ccfda4555a6315e
SHA1b70aa74a65cbec2e58fb7afd70c3af0c784f5714
SHA2568315f2fb8e62da37c41f8ba23c710a2a62a4eac612d075ec7631306946c713d6
SHA5121033d2ae17772019f750dfc577e3ccb2088da28b75d5db6154cb303748703da415efb6fd5fa83d147e385edb9d338069a2b98d219bd70c2ff089075d4bab0455
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5360ffab94abb1df0348c71fa17c9b507
SHA1e184a47f8c85e8fc0d8d6af733f8351360c76394
SHA256da63e8a4346368d2510a5332e39bd186d8649a8c095e79b580bbab7a2ab4b146
SHA51204c69cb7e7c3942389244d785c41c420abca41011c2833038d1fba87ce4e2f8d2a927a52eed2fcd601148975949c0f606ab5d522bac7bd1e66133a13fd44e119
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e961e69c652820962a40d45e4b187a27
SHA1dad1f0cf4d496db5807df2846ac320107a6dc670
SHA256450360f4ee2fbabadc8d2537780a895864a21559330f7a0578f0769558ae4754
SHA512deb054bf77186ac8b31de7865b143d4e87a9d4857dc5e0f1ea1196accf8a53aeafeea444e66dbd529913a041d14eeaae0604fb5c5956caa6213aac037eabad60
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a